privilege-declaration-generator
Generates tizen-manifest.xml and config.xml privilege declarations. Auto-detects required privileges from app source code.
Best use case
privilege-declaration-generator is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Generates tizen-manifest.xml and config.xml privilege declarations. Auto-detects required privileges from app source code.
Teams using privilege-declaration-generator should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/privilege-declaration-generator/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How privilege-declaration-generator Compares
| Feature / Agent | privilege-declaration-generator | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Generates tizen-manifest.xml and config.xml privilege declarations. Auto-detects required privileges from app source code.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# Privilege Declaration Generator Skill **Trit**: 1 (PLUS) **Category**: tizen-development **Author**: Tizen Community **Source**: tizen/development **License**: Apache-2.0 ## Description Generates tizen-manifest.xml and config.xml privilege declarations. Auto-detects required privileges from app source code. ## When to Use This is a Tizen security/IoT skill. Use when: - Developing Tizen applications (web, native, .NET) - Auditing Tizen app security - Provisioning TizenRT/ARTIK IoT devices - Implementing Tizen compliance - Analyzing SMACK policies or Cynara access control ## Tizen Security Model ### SMACK (Simplified Mandatory Access Control Kernel) - Linux kernel 3.12+ mandatory access control - Process isolation via labels - Prevent inter-app resource access ### Cynara - Fast privilege access control service - Policy-based permission checking - External agent integration ### KeyManager - Central secure storage repository - Password-protected data access - Certificate and key management ### Tizen Manifest - Privilege declarations (public, partner, platform) - App sandboxing configuration - Resource access specifications ## Related Skills - manifest-privilege-validator - smack-policy-auditor - tizen-cve-scanner - sandbox-escape-detector - cynara-policy-checker - iot-device-provisioning ## References - Tizen Official Docs: https://docs.tizen.org/ - Samsung Security Manager: https://github.com/Samsung/security-manager - Samsung Cynara: https://github.com/Samsung/cynara - TizenRT: https://github.com/Samsung/TizenRT
Related Skills
testing-handbook-generator
Generates comprehensive testing handbooks and guides for security testing strategies.
smack-policy-generator
Generates SMACK policy files from app requirements. Creates mandatory access control rules for process isolation and resource access.
reverse-derivative-generator
Triadic skill (generation)
phase-portrait-generator
Generate phase portraits for 2D dynamical systems. Use when visualizing vector fields, nullclines, and trajectories.
performing-privileged-account-discovery
Discover and inventory all privileged accounts across enterprise infrastructure including domain admins, local admins, service accounts, database admins, cloud IAM roles, and application admin account
performing-privilege-escalation-on-linux
Linux privilege escalation involves elevating from a low-privilege user account to root access on a compromised system. Red teams exploit misconfigurations, vulnerable services, kernel exploits, and w
performing-privilege-escalation-assessment
Performs privilege escalation assessments on compromised Linux and Windows systems to identify paths from low-privilege access to root or SYSTEM-level control. The tester enumerates misconfigurations, vulnerable services, kernel exploits, SUID binaries, unquoted service paths, and credential stores to demonstrate the full impact of an initial compromise. Activates for requests involving privilege escalation testing, local exploitation, post-compromise escalation, or OS-level security assessment.
performing-aws-privilege-escalation-assessment
Performing authorized privilege escalation assessments in AWS environments to identify IAM misconfigurations that allow users or roles to elevate their permissions using Pacu, CloudFox, Principal Mapper, and manual IAM policy analysis techniques.
manifest-privilege-validator
Validates tizen-manifest.xml privilege declarations. Checks privilege correctness, required privilege levels, and manifest conformance.
implementing-zero-standing-privilege-with-cyberark
Deploy CyberArk Secure Cloud Access to eliminate standing privileges in hybrid and multi-cloud environments using just-in-time access with time, entitlement, and approval controls.
implementing-privileged-session-monitoring
Implements privileged session monitoring and recording using Privileged Access Management (PAM) solutions, focusing on CyberArk Privileged Session Manager (PSM) and open-source alternatives. Covers session recording configuration, keystroke logging, real-time monitoring, risk-based session analysis, and compliance audit trail generation. Activates for requests involving privileged session recording, PAM session monitoring, CyberArk PSM configuration, administrator activity monitoring, or compliance session auditing.
implementing-privileged-access-workstation
Design and implement Privileged Access Workstations (PAWs) with device hardening, just-in-time access, and integration with CyberArk or BeyondTrust for secure administrative operations.